-
1
-
-
84877694409
-
-
audit2allow. http://fedoraproject.org/wiki/SELinux/audit2allow.
-
Audit2allow
-
-
-
2
-
-
84877705226
-
-
Apache Performance Tuning. http://httpd.apache.org/docs/2.2/misc/perf- tuning.html#symlinks, 2012.
-
(2012)
Apache Performance Tuning
-
-
-
4
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Saner: Composing static and dynamic analysis to validate sanitization in web applications. In IEEE SSP, 2008.
-
(2008)
IEEE SSP
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
5
-
-
0030092390
-
Checking for race conditions in file accesses
-
Spring
-
M. Bishop and M. Digler. Checking for race conditions in file accesses. Computer Systems, 9(2), Spring 1996.
-
(1996)
Computer Systems
, vol.9
, Issue.2
-
-
Bishop, M.1
Digler, M.2
-
7
-
-
84877714434
-
Exploiting Unix File-System Races via Algorithmic Complexity Attacks
-
X. Cai, Y. Gui, and R. Johnson. Exploiting Unix File-System Races via Algorithmic Complexity Attacks. In IEEE SSP, 2009.
-
(2009)
IEEE SSP
-
-
Cai, X.1
Gui, Y.2
Johnson, R.3
-
8
-
-
85180543366
-
Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation
-
S. Chari, S. Halevi, and W. Venema. Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation. In NDSS '10, 2010.
-
(2010)
NDSS '10
-
-
Chari, S.1
Halevi, S.2
Venema, W.3
-
9
-
-
34548713464
-
POLUS: A POwerful live updating system
-
H. Chen, J. Yu, R. Chen, B. Zang, and P. chung Yew. POLUS: A POwerful live updating system. In 29th Intl Conf. on Software Engineering, pages 271-281, 2007.
-
(2007)
29th Intl Conf. on Software Engineering
, pp. 271-281
-
-
Chen, H.1
Yu, J.2
Chen, R.3
Zang, B.4
Chung Yew, P.5
-
16
-
-
85084160542
-
A flexible containment mechanism for executing untrusted code
-
David S. Peterson and Matt Bishop and Raju P. A flexible containment mechanism for executing untrusted code. In USENIX Security, 2002.
-
(2002)
USENIX Security
-
-
Peterson, D.S.1
Bishop, M.2
Raju, P.3
-
17
-
-
33845455287
-
Fixing races for fun and profit
-
D. Dean and A. Hu. Fixing races for fun and profit. In USENIX Security, 2004.
-
(2004)
USENIX Security
-
-
Dean, D.1
Hu, A.2
-
18
-
-
84877716617
-
Formalizing sensitivity in static analysis for intrusion detection
-
H. H. Feng, J. T. Giffin, Y. Huang, S. Jha, W. Lee, and B. P. Miller. Formalizing sensitivity in static analysis for intrusion detection. In IEEE SSP '04, 2004.
-
(2004)
IEEE SSP '04
-
-
Feng, H.H.1
Giffin, J.T.2
Huang, Y.3
Jha, S.4
Lee, W.5
Miller, B.P.6
-
20
-
-
85180527583
-
Traps and pitfalls: Practical problems in in system call interposition based security tools
-
T. Garfinkel. Traps and pitfalls: Practical problems in in system call interposition based security tools. In NDSS, 2003.
-
(2003)
NDSS
-
-
Garfinkel, T.1
-
21
-
-
85180406262
-
Ostia: A delegating architecture for secure system call interposition
-
T. Garfinkel, B. Pfaff, and M. Rosenblum. Ostia: A delegating architecture for secure system call interposition. In NDSS, 2004.
-
(2004)
NDSS
-
-
Garfinkel, T.1
Pfaff, B.2
Rosenblum, M.3
-
22
-
-
36448960621
-
Environment-sensitive intrusion detection
-
J. T. Giffin, D. Dagon, S. Jha, W. Lee, and B. P. Miller. Environment-sensitive intrusion detection. In RAID '06, 2006.
-
(2006)
RAID '06
-
-
Giffin, J.T.1
Dagon, D.2
Jha, S.3
Lee, W.4
Miller, B.P.5
-
24
-
-
85077749236
-
Analyzing Integrity Protection in the SELinux Example Policy
-
T. Jaeger, R. Sailer, and X. Zhang. Analyzing Integrity Protection in the SELinux Example Policy. In USENIX Security, 2003.
-
(2003)
USENIX Security
-
-
Jaeger, T.1
Sailer, R.2
Zhang, X.3
-
25
-
-
3142518085
-
Consistency analysis of authorization hook placement in the Linux security modules framework
-
T. Jaeger, A. Edwards, and X. Zhang. Consistency analysis of authorization hook placement in the Linux security modules framework. ACM Trans. Inf. Syst. Secur., 2004.
-
(2004)
ACM Trans. Inf. Syst. Secur.
-
-
Jaeger, T.1
Edwards, A.2
Zhang, X.3
-
26
-
-
57749192483
-
Information flow control for standard OS abstractions
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. Frans, K. Eddie, and K. R. Morris. Information flow control for standard OS abstractions. In SOSP, 2007.
-
(2007)
SOSP
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Frans, M.5
Eddie, K.6
Morris, K.R.7
-
28
-
-
0016336411
-
Operating system integrity in OS/VS2
-
W. S. McPhee. Operating system integrity in OS/VS2. IBM Syst. J., 1974.
-
(1974)
IBM Syst. J.
-
-
McPhee, W.S.1
-
29
-
-
84877710750
-
Enforcing user-space privilege separation with declarative architectures
-
B. Niu and G. Tan. Enforcing user-space privilege separation with declarative architectures. In ACM STC, 2012.
-
(2012)
ACM STC
-
-
Niu, B.1
Tan, G.2
-
31
-
-
84877720432
-
-
NSA. SELinux, 2012. http://www.nsa.gov/selinux.
-
(2012)
SELinux
-
-
-
33
-
-
84877697492
-
Safe loading - A foundation for secure execution of untrusted programs
-
M. Payer, T. Hartmann, and T. R. Gross. Safe loading - a foundation for secure execution of untrusted programs. In IEEE S&P, 2012.
-
(2012)
IEEE S&P
-
-
Payer, M.1
Hartmann, T.2
Gross, T.R.3
-
34
-
-
84878346861
-
Improving host security with system call policies
-
N. Provos. Improving host security with system call policies. In USENIX Security, 2003.
-
(2003)
USENIX Security
-
-
Provos, N.1
-
37
-
-
20444442399
-
A fast automaton-based method for detecting anomalous program behaviors
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automaton-based method for detecting anomalous program behaviors. In IEEE SS&P '01, 2001.
-
(2001)
IEEE SS&P '01
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
38
-
-
17644422613
-
Model-carrying code: A practical approach for safe execution of untrusted applications
-
R. Sekar, V. Venkatakrishnan, S. Basu, S. Bhatkar, and D. C. DuVarney. Model-carrying code: a practical approach for safe execution of untrusted applications. In SOSP '03, 2003.
-
(2003)
SOSP '03
-
-
Sekar, R.1
Venkatakrishnan, V.2
Basu, S.3
Bhatkar, S.4
DuVarney, D.C.5
-
40
-
-
84871971635
-
Integrity walls: Finding attack surfaces from mandatory access control policies
-
H. Vijayakumar, G. Jakka, S. Rueda, J. Schiffman, and T. Jaeger. Integrity walls: Finding attack surfaces from mandatory access control policies. In ASIACCS, 2012.
-
(2012)
ASIACCS
-
-
Vijayakumar, H.1
Jakka, G.2
Rueda, S.3
Schiffman, J.4
Jaeger, T.5
-
44
-
-
78449281125
-
Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems
-
J. Wei and C. Pu. Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems. Computers & Security, 2010.
-
(2010)
Computers & Security
-
-
Wei, J.1
Pu, C.2
-
45
-
-
85084164351
-
Linux security modules: General security support for the Linux kernel
-
C. Wright, C. Cowan, and J. Morris. Linux security modules: General security support for the Linux kernel. In USENIX Security, 2002.
-
(2002)
USENIX Security
-
-
Wright, C.1
Cowan, C.2
Morris, J.3
-
47
-
-
85084161756
-
Using CQUAL for static analysis of authorization hook placement
-
X. Zhang, A. Edwards, and T. Jaeger. Using CQUAL for static analysis of authorization hook placement. In USENIX Security, 2002.
-
(2002)
USENIX Security
-
-
Zhang, X.1
Edwards, A.2
Jaeger, T.3
|